VA seeks cemetery tracking system

VA seeks cemetery tracking system

The Department of Veterans Affairs is seeking a system to help it with digital mapping, internment notices and remains tracking in its 131 cemeteries.

2015 mobility mantra: manage data, not devices

2015 mobility mantra: manage data, not devices

Government mobility managers are racing to stay ahead of the proliferation of mobile devices with strategies that focus on data and applications rather than devices themselves.

Should APIs be free from copyright?

Should APIs be free from copyright?

The Supreme Court is considering a decision involving Google and Oracle that would allow a form of copyright on application programming interfaces.

Census wants tools to identify address changes

Census wants tools to identify address changes

The Census Bureau issued a request for information for tools to flag potential changes in addresses, roads and boundaries that might affect the accuracy of the 2020 census.

Turtle Mike speeds multichannel emergency response

Turtle Mike speeds multichannel emergency response

The Department of Homeland Security has developed a bridging technology that enables public safety response teams to unite land mobile radio and broadband to help coordinate rescue and speed emergency response.

Citizen engagement trends

Citizen engagement tools deliver ‘government your way’

Consumer technologies are finding new uses in government as agencies find ways to deliver services to citizens wherever and however they need them.

Privacy accessories for the secure and stylish

Privacy wearables and accessories for the secure – and stylish

After the wakeup call from the Sony hack, people inside and outside of government are taking a harder look at protecting their personal information – and vendors are ready with solutions from stylish privacy accessories to secure communications ecosystems.

Fujitsu launches secure enterprise tablets

Fujitsu launches secure enterprise tablets

Fujitsu introduced two 'enterprise-ready' Windows tablets this week, targeting government users who need extra security features.

Need an app store? Salesforce, Microsoft have options.

Need an app store? Salesforce, Microsoft have options.

Salesforce's AppExchange Store Builder is a platform to help organizations quickly create a fully customizable app marketplace. And Microsoft is expected to include app store management in Windows 10.

Federal health IT wish list: more mobile, telehealth, analytics, open data

Health IT wish list: more mobile, telehealth, analytics, open data

National Coordinator for Health IT's draft five-year plan outlines expanded health information sharing through mobile, sensor and analytics technologies.

Can BlackBerry Classic power a comeback?

Can BlackBerry Classic power a comeback?

BlackBerry Classic returns to the old form factor and includes BlackBerry Balance, the technology that allows personal and work data to reside in separate partitions on the device.

Rugged in 2015: Big, bad and Android

Rugged in 2015: Big, bad and Android

Look for bigger, tougher Android devices in 2015, but watch for IP ratings creep.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.